
{"id":206,"date":"2026-04-07T17:26:40","date_gmt":"2026-04-07T17:26:40","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cjudy002\/?page_id=206"},"modified":"2026-04-14T19:08:35","modified_gmt":"2026-04-14T19:08:35","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cjudy002\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"\n<p><strong>Cybersecurity Techniques and Operations <\/strong><\/p>\n\n\n\n<p>Focused on tools and techniques involved in real-world cyber operations. Learned about a broad range of cybersecurity concepts and essential hands-on training related to work preformed by cybersecurity professionals. Learned basic cybersecurity discipline, utilized the model computing environment, and practiced with different tools and strategies to perform cyber<br>attacks and defense operations.<\/p>\n\n\n\n<p>Met the following learning objectives:<\/p>\n\n\n\n<ul>\n<li>Learned the rules and laws involved in real-world cyber operations<\/li>\n\n\n\n<li>Learned the basic components of the model computing networks, and take different<br>techniques to identify and trace the network traffic if an instruction is detected inside a<br>network,<\/li>\n\n\n\n<li>Identified and evaluated the vulnerabilities in the network and implemented effective<br>countermeasures to protect networks from cyberattacks<\/li>\n\n\n\n<li>Learned how to plan, organize and perform penetration testing on a network <\/li>\n\n\n\n<li>Learned different cryptographic protocols, tools, and mechanisms used for different systems, and exploited their weaknesses accordingly<\/li>\n\n\n\n<li>Managed data and personal information in a secure manner<\/li>\n<\/ul>\n\n\n\n<p><strong>Coursework<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/drive.google.com\/drive\/u\/0\/folders\/1MG0thQQe5GoMcndYxX7XUHxbUkVVJkGk\">https:\/\/drive.google.com\/drive\/u\/0\/folders\/1MG0thQQe5GoMcndYxX7XUHxbUkVVJkGk<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations Focused on tools and techniques involved in real-world cyber operations. Learned about a broad range of<\/p>\n<div class=\"read-button read_more_btn_text\"><a class=\"read_more\" href=\"https:\/\/student.wp.odu.edu\/cjudy002\/cyse-301\/\">Read Now<span class=\"arrow_readm\"> &#x25BA;<\/span><\/a><\/div>\n","protected":false},"author":25776,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/206"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/users\/25776"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/comments?post=206"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/206\/revisions"}],"predecessor-version":[{"id":270,"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/pages\/206\/revisions\/270"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cjudy002\/wp-json\/wp\/v2\/media?parent=206"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}